Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-25847

CVSS 8.2 · High EPSS 0.01% · P0
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-25847

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In JetBrains PyCharm before 2025.3.2 a DOM-based XSS on Jupyter viewer page was possible
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
JetBrains PyCharm 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
JetBrains PyCharm是捷克JetBrains公司的一款针对Python语言的集成开发环境(IDE)。 JetBrains PyCharm 2025.3.2之前版本存在跨站脚本漏洞,该漏洞源于Jupyter查看器页面存在基于DOM的跨站脚本,可能导致跨站脚本攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
JetBrainsPyCharm 0 ~ 2025.3.2 -

II. Public POCs for CVE-2026-25847

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-25847

登录查看更多情报信息。

Same Patch Batch · JetBrains · 2026-02-09 · 3 CVEs total

CVE-2026-258489.1 CRITICALJetBrains Hub 访问控制错误漏洞
CVE-2026-258466.5 MEDIUMJetBrains YouTrack 日志信息泄露漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2026-25847

No comments yet


Leave a comment